Author of the publication

A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems.

, , and . Computer Networks, 53 (10): 1628-1648 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exptime Tableaux for ALC., , and . Description Logics, volume WS-96-05 of AAAI Technical Report, page 107-110. AAAI Press, (1996)IT Interdependence and the Economic Fairness of Cybersecurity Regulations for Civil Aviation., , , , and . IEEE Security & Privacy, 13 (5): 52-61 (2015)Action, Inaction, Trust, and Cybersecurity's Common Property Problem., , and . IEEE Security & Privacy, 14 (1): 82-86 (2016)Then and Now: On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned., , and . IEEE Trans. Emerging Topics Comput., 4 (1): 35-46 (2016)Verifying security protocols as planning in logic programming., and . ACM Trans. Comput. Log., 2 (4): 542-580 (2001)Security-by-contract on the .NET platform., , , , , , and . Inf. Sec. Techn. Report, 13 (1): 25-32 (2008)Security-by-Contract-with-Trust for Mobile Devices., , , , , , , and . JoWUA, 1 (4): 75-91 (2010)The proof complexity of analytic and clausal tableaux.. Theor. Comput. Sci., 243 (1-2): 477-487 (2000)EXPTIME tableaux for ALC., and . Artif. Intell., 124 (1): 87-138 (2000)JCS special issue on EU-funded ICT research on Trust and Security., , , , and . Journal of Computer Security, 18 (1): 1-5 (2010)